General
-
Target
6b01a6ef5d2dafc2fe58f38ad3d05a70575ebaa3bee0956fefffddd35beb77d0
-
Size
1.1MB
-
Sample
230413-m43vxaah66
-
MD5
a96dfa7be7f331d373c47be877f61824
-
SHA1
aae2e7da7361c08fda17cae254373652972fff8a
-
SHA256
6b01a6ef5d2dafc2fe58f38ad3d05a70575ebaa3bee0956fefffddd35beb77d0
-
SHA512
d789dabceb2360af5a4ae8abdc753b986a21ced21195c9cc058ce38a44ac04631f7d110c2473e258c8f335946965325192dba43a25fb3402d49eb8949f64db67
-
SSDEEP
24576:tymNGaE56IFTZFKUroKuM3rNJ1ejqKp6akg37chLMDtB7S:IW4/NOUMnGejJp6aGde
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Targets
-
-
Target
6b01a6ef5d2dafc2fe58f38ad3d05a70575ebaa3bee0956fefffddd35beb77d0
-
Size
1.1MB
-
MD5
a96dfa7be7f331d373c47be877f61824
-
SHA1
aae2e7da7361c08fda17cae254373652972fff8a
-
SHA256
6b01a6ef5d2dafc2fe58f38ad3d05a70575ebaa3bee0956fefffddd35beb77d0
-
SHA512
d789dabceb2360af5a4ae8abdc753b986a21ced21195c9cc058ce38a44ac04631f7d110c2473e258c8f335946965325192dba43a25fb3402d49eb8949f64db67
-
SSDEEP
24576:tymNGaE56IFTZFKUroKuM3rNJ1ejqKp6akg37chLMDtB7S:IW4/NOUMnGejJp6aGde
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-